-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sun, 02 Oct 2011 14:28:25 +0200 Source: quagga Binary: quagga quagga-doc Architecture: s390 Version: 0.99.10-1lenny6 Distribution: lenny-security Urgency: high Maintainer: s390 Build Daemon (zandonai) Changed-By: Florian Weimer Description: quagga - BGP/OSPF/RIP routing daemon quagga-doc - documentation files for quagga Changes: quagga (0.99.10-1lenny6) lenny-security; urgency=high . * SECURITY: This is a backport of the security patches of Quagga 0.99.19 and 0.99.20: - The vulnerabilities CVE-2011-3324 and CVE-2011-3323 are related to the IPv6 routing protocol (OSPFv3) implemented in ospf6d daemon. Receiving modified Database Description and Link State Update messages, respectively, can result in denial of service in IPv6 routing. - The vulnerability CVE-2011-3325 is a denial of service vulnerability related to Hello message handling by the OSPF service. As Hello messages are used to initiate adjacencies, exploiting the vulnerability may be feasible from the same broadcast domain without an established adjacency. A malformed packet may result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3326 results from the handling of LSA (Link State Advertisement) states in the OSPF service. Receiving a modified Link State Update message with malicious state information can result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3327 is related to the extended communities handling in BGP messages. Receiving a malformed BGP update can result in a buffer overflow and disruption of IPv4 routing. Checksums-Sha1: 1c652c8a530bf27b857fcba5571063bedd2d01be 1799378 quagga_0.99.10-1lenny6_s390.deb Checksums-Sha256: 51bc97d323222d43852066cd1a63cd2b32019eea8d2231b5947a010cc843d40b 1799378 quagga_0.99.10-1lenny6_s390.deb Files: 6d0c320ea53b0270596e5dba5923263a 1799378 net optional quagga_0.99.10-1lenny6_s390.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBCAAGBQJOi3EGAAoJEPaODSItlB0mWBMP/3sek7K1ZqAM2bAEJMDxphXW Pms3j/ybJD2Xh44ZptnJqkW2ztiRBk+hoHqZyvC3d9uptsMEGlb44nXWOxX9QMJv VwfUnG+ZZMqk713/h8zPrGmY5vrBBuQVAszm54oq4YcfIEUexkb4QUHJEyzteCom HAb68hxXGuISsDf+m2kfmuBP/p6LrO+MqzJ6SkD4l4HYb0GMt7JIvZFjShJCqwbM Pnn5SJxKMsB/8dfaPTTR4G2VHDsJibmdzclb6TvTva28bAjreUu28c3APL7tsGNA kT/TTttbOcca8a1PH3aPhNsKjSi9CuJCh1pqj3L7AfIjNDwEeug8qh8w/t9mUchl 1HiCzvbg/rIjgajVsk5o30lQMx3AT7FCKO4fgLVyUQfZAJPnDadVngGxMv3AOR7C UVTMy0/PegQqxd0CAUOXHlbsqtr4e0Y3QkqcwILYK+D20CiHms1sS6y7Mh6Ppz9G raehMc5P1dat7s3cqegvL2shGBnkLEyPwPF3/vFMrabjjFViWt4dZ/Q7R1MCDO75 HDL47FFDJf8AcEziALsiOkDO9t6jdn5K+XYm396nrWwIPezLystIQf7SNdqStRvW O19XliufnAwbsjU9XvNOxN98NbA5OIk5T4FpojD0w0HFUT30S5muH+g6aAOi6oJq 0ZqY/eCGZKX+S8S7XlMH =J088 -----END PGP SIGNATURE-----